• Title/Summary/Keyword: Simulation-Based Optimization

Search Result 1,450, Processing Time 0.03 seconds

Java Memory Model Simulation using SMT Solver (SMT 해결기를 이용한 자바 메모리 모델 시뮬레이션)

  • Lee, Tae-Hoon;Kwon, Gi-Hwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.1
    • /
    • pp.62-66
    • /
    • 2009
  • Recently developed compilers perform some optimizations in order to speed up the execution time of source program. These optimizations require the transformation of the sequence of program statements. This transformation does not give any problems in a single-threaded program. However, the transformation gives some significant errors in a multi-threaded program. State-of-the-art model checkers such as Java-Pathfinder do not consider the transformation resulted in the optimization step in a compiler since they just consider a single memory model. In this paper, we describe a new technique which is based on SMT solver. The Java Memory Model Simulator based on SMT Solver can compute all possible output of given multi-thread program within one second which, in contrast, Traditional Java Memory Model Simulator takes one minute.

Efficient Internet Traffic Engineering based on Shortest Path Routing (최단경로 라우팅을 이용한 효율적인 인터넷 트래픽 엔지니어링)

  • 이영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.183-191
    • /
    • 2004
  • Single shortest path routing is known to perform poorly for Internet traffic engineering (TE) where the typical optimization objective is to minimize the maximum link load. Splitting traffic uniformly over equal cost multiple shortest paths in OSPF and IS-IS does not always minimize the maximum link load when multiple paths are not carefully selected for the global traffic demand matrix. However, among all the equal cost multiple shortest paths in the network, a set of TE-aware shortest paths, which reduces the maximum link load significantly, can be found and used by IP routers without any change of existing routing protocols and serious configuration overhead. While calculating TE-aware shortest paths. the destination-based forwarding constraint at a node should be satisfied, because an IP router will forward a packet to the next-hop toward the destination by looking up the destination prefix. In this paper, we present a problem formulation of finding a set of TE-aware shortest paths in ILP, and propose a simple heuristic for the problem. From the simulation results, it is shown that TE-aware shortest path routing performs better than default shortest path routing and ECMP in terms of the maximum link load with the marginal configuration overhead of changing the next-hops.

Optimization of the Vertical Localization Scale for GPS-RO Data Assimilation within KIAPS-LETKF System (KIAPS 앙상블 자료동화 시스템을 이용한 GPS 차폐자료 연직 국지화 규모 최적화)

  • Jo, Youngsoon;Kang, Ji-Sun;Kwon, Hataek
    • Atmosphere
    • /
    • v.25 no.3
    • /
    • pp.529-541
    • /
    • 2015
  • Korea Institute of Atmospheric Prediction System (KIAPS) has been developing a global numerial prediction model and data assimilation system. We has implemented LETKF (Local Ensemble Transform Kalman Filter, Hunt et al., 2007) data assimilation system to NCAR CAM-SE (National Center for Atmospheric Research Community Atmosphere Model with Spectral Element dynamical core, Dennis et al., 2012) that has cubed-sphere grid, known as the same grid system of KIAPS Integrated Model (KIM) now developing. In this study, we have assimilated Global Positioning System Radio Occultation (GPS-RO) bending angle measurements in addition to conventional data within ensemble-based data assimilation system. Before assimilating bending angle data, we performed a vertical unit conversion. The information of vertical localization for GPS-RO data is given by the unit of meter, but the vertical localization method in the LETKF system is based on pressure unit. Therefore, with a clever conversion of the vertical information, we have conducted experiments to search for the best vertical localization scale on GPS-RO data under the Observing System Simulation Experiments (OSSEs). As a result, we found the optimal setting of vertical localization for the GPS-RO bending angle data assimilation. We plan to apply the selected localization strategy to the LETKF system implemented to KIM which is expected to give better analysis of GPS-RO data assimilation due to much higher model top.

A Linear Program Based Heuristic for the Bit and Subchannel Allocation in an OFDM System (OFDM 시스템의 비트 및 부채널 할당을 위한 선형계획법 기반 휴리스틱)

  • Moon, Woosik;Kim, Sunho;Park, Taehyung;Im, Sungbin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.67-75
    • /
    • 2013
  • The advantages of the orthogonal frequency division multiplexing (OFDM) are high spectral efficiency, resiliency to RF interference, and lower multi-path distortion. To further utilize vast channel capacity of the multiuser OFDM, one has to find the efficient adaptive subchannel and bit allocation among users. In this paper, we compare the performance of the linear programming dual of the 0-1 integer programming formulation with the existing convex optimization approach for the optimal subchannel and bit allocation problem of the multiuser OFDM. Utilizing tight lower bound provided by the LP dual formulation, we develop a primal heurisitc algorithm based on the LP dual solution. The performance of the primal heuristic is compared with MAO, ESA heuristic solutions, and integer programming solution on MATLAB simulation on a system employing M-ary quadrature amplitude modulation (MQAM) assuming a frequency-selective channel consisting of three independent Rayleigh multi-paths.

Magnetorheological elastomer base isolator for earthquake response mitigation on building structures: modeling and second-order sliding mode control

  • Yu, Yang;Royel, Sayed;Li, Jianchun;Li, Yancheng;Ha, Quang
    • Earthquakes and Structures
    • /
    • v.11 no.6
    • /
    • pp.943-966
    • /
    • 2016
  • Recently, magnetorheological elastomer (MRE) material and its devices have been developed and attracted a good deal of attention for their potentials in vibration control. Among them, a highly adaptive base isolator based on MRE was designed, fabricated and tested for real-time adaptive control of base isolated structures against a suite of earthquakes. To perfectly take advantage of this new device, an accurate and robust model should be built to characterize its nonlinearity and hysteresis for its application in structural control. This paper first proposes a novel hysteresis model, in which a nonlinear hyperbolic sine function spring is used to portray the strain stiffening phenomenon and a Voigt component is incorporated in parallel to describe the solid-material behaviours. Then the fruit fly optimization algorithm (FFOA) is employed for model parameter identification using testing data of shear force, displacement and velocity obtained from different loading conditions. The relationships between model parameters and applied current are also explored to obtain a current-dependent generalized model for the control application. Based on the proposed model of MRE base isolator, a second-order sliding mode controller is designed and applied to the device to provide a real-time feedback control of smart structures. The performance of the proposed technique is evaluated in simulation through utilizing a three-storey benchmark building model under four benchmark earthquake excitations. The results verify the effectiveness of the proposed current-dependent model and corresponding controller for semi-active control of MRE base isolator incorporated smart structures.

A Markov Approximation-Based Approach for Network Service Chain Embedding (Markov Approximation 프레임워크 기반 네트워크 서비스 체인 임베딩 기법 연구)

  • Chuan, Pham;Nguyen, Minh N.H.;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.719-725
    • /
    • 2017
  • To reduce management costs and improve performance, the European Telecommunication Standards Institute (ETSI) introduced the concept of network function virtualization (NFV), which can implement network functions (NFs) on cloud/datacenters. Within the NFV architecture, NFs can share physical resources by hosting NFs on physical nodes (commodity servers). For network service providers who support NFV architectures, an efficient resource allocation method finds utility in being able to reduce operating expenses (OPEX) and capital expenses (CAPEX). Thus, in this paper, we analyzed the network service chain embedding problem via an optimization formulation and found a close-optimal solution based on the Markov approximation framework. Our simulation results show that our approach could increases on average CPU utilization by up to 73% and link utilization up to 53%.

Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture

  • Jiang, Lirong;Feng, Gang;Qin, Shuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4268-4290
    • /
    • 2015
  • Future mobile communications face enormous challenges as traditional voice services are replaced with increasing mobile multimedia and data services. To address the vast data traffic volume and the requirement of user Quality of Experience (QoE) in the next generation mobile networks, it is imperative to develop efficient content distribution technique, aiming at significantly reducing redundant data transmissions and improving content delivery performance. On the other hand, in recent years cloud computing as a promising new content-centric paradigm is exploited to fulfil the multimedia requirements by provisioning data and computing resources on demand. In this paper, we propose a cooperative caching framework which implements State based Content Distribution (SCD) algorithm for future mobile networks. In our proposed framework, cloud service providers deploy a plurality of cloudlets in the network forming a Distributed Cloud Service Network (DCSN), and pre-allocate content services in local cloudlets to avoid redundant content transmissions. We use content popularity and content state which is determined by content requests, editorial updates and new arrivals to formulate a content distribution optimization model. Data contents are deployed in local cloudlets according to the optimal solution to achieve the lowest average content delivery latency. We use simulation experiments to validate the effectiveness of our proposed framework. Numerical results show that the proposed framework can significantly improve content cache hit rate, reduce content delivery latency and outbound traffic volume in comparison with known existing caching strategies.

Virtual Network Embedding through Security Risk Awareness and Optimization

  • Gong, Shuiqing;Chen, Jing;Huang, Conghui;Zhu, Qingchao;Zhao, Siyi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2892-2913
    • /
    • 2016
  • Network virtualization promises to play a dominant role in shaping the future Internet by overcoming the Internet ossification problem. However, due to the injecting of additional virtualization layers into the network architecture, several new security risks are introduced by the network virtualization. Although traditional protection mechanisms can help in virtualized environment, they are not guaranteed to be successful and may incur high security overheads. By performing the virtual network (VN) embedding in a security-aware way, the risks exposed to both the virtual and substrate networks can be minimized, and the additional techniques adopted to enhance the security of the networks can be reduced. Unfortunately, existing embedding algorithms largely ignore the widespread security risks, making their applicability in a realistic environment rather doubtful. In this paper, we attempt to address the security risks by integrating the security factors into the VN embedding. We first abstract the security requirements and the protection mechanisms as numerical concept of security demands and security levels, and the corresponding security constraints are introduced into the VN embedding. Based on the abstraction, we develop three security-risky modes to model various levels of risky conditions in the virtualized environment, aiming at enabling a more flexible VN embedding. Then, we present a mixed integer linear programming formulation for the VN embedding problem in different security-risky modes. Moreover, we design three heuristic embedding algorithms to solve this problem, which are all based on the same proposed node-ranking approach to quantify the embedding potential of each substrate node and adopt the k-shortest path algorithm to map virtual links. Simulation results demonstrate the effectiveness and efficiency of our algorithms.

Genetic Algorithm based Resource Management for Cognitive Mesh Networks with Real-time and Non-real-time Services

  • Shan, Hangguan;Ye, Ziyun;Bi, Yuanguo;Huang, Aiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.2774-2796
    • /
    • 2015
  • Quality-of-service (QoS) provisioning for a cognitive mesh network (CMN) with heterogeneous services has become a challenging area of research in recent days. Considering both real-time (RT) and non-real-time (NRT) traffic in a multihop CMN, [1] studied cross-layer resource management, including joint access control, route selection, and resource allocation. Due to the complexity of the formulated resource allocation problems, which are mixed-integer non-linear programming, a low-complexity yet efficient algorithm was proposed there to approximately solve the formulated optimization problems. In contrast, in this work, we present an application of genetic algorithm (GA) to re-address the hard resource allocation problems studied in [1]. Novel initialization, selection, crossover, and mutation operations are designed such that solutions with enough randomness can be generated and converge with as less number of attempts as possible, thus improving the efficiency of the algorithm effectively. Simulation results show the effectiveness of the newly proposed GA-based algorithm. Furthermore, by comparing the performance of the newly proposed algorithm with the one proposed in [1], more insights have been obtained in terms of the tradeoff among QoS provisioning for RT traffic, throughput maximization for NRT traffic, and time complexity of an algorithm for resource allocation in a multihop network such as CMN.

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.